Security Incidents mailing list archives

Re: RES: Massive SPAM Increase


From: Paul Dean <paul () thecave ws>
Date: Wed, 11 Oct 2006 14:45:20 +0800

Hya All,

Anyone bother to think about using the wonderful rbl lists provided by lots of fast healthy servers around the world.

IE spamcop.net,
abuseat.org,
spamhaus.org (although this one has some court orders against it, see http://it.slashdot.org/it/06/10/10/140203.shtml)
ordb.org

plus many many more.

Most of these have howto's posted for different MTA's or at least links to sites to help.

Once I started using these lists, my spam dropped from like 1000 a day to 20 a day, just configuring Postfix and 5 rbl's.


Tiago Quadra wrote:
The milter API is great, no MTA solution will allow the same level of customization as sendmail with libmilter. For the users that find it difficult to understand and implement there's allow MIMEDefang: a perl script interface to use the milter API filter.
www.mimedefang.org

[]s
TQ

-----Mensagem original-----
De: listbounce () securityfocus com [mailto:listbounce () securityfocus com] Em nome de Tillmann Werner
Enviada em: terça-feira, 10 de outubro de 2006 16:45
Para: incidents () securityfocus com
Assunto: Re: Massive SPAM Increase

Can someone recommend a similar solution for sendmail?

Have a look at <http://www.sendmail.org/doc/sendmail-current/libmilter/docs/> and <http://www.milter.org/>. The sendmail mail filter API "milter" is around for several years now and the list of milter applications is quite big.

As far as I remember, milter applications hook the SMTP dialogue and are thus able to intercept it in any state, i.e. before the DATA.

Without that recommendation being "stop using sendmail"? ;)

With sendmail X there seems to be a cool MTA coming up.

Cheers,
Tillmann

------------------------------------------------------------------------------
This List Sponsored by: Black Hat

Attend the Black Hat Briefings & Training USA, July 29-August 3 in Las Vegas. World renowned security experts reveal tomorrow's threats today. Free of vendor pitches, the Briefings are designed to be pragmatic regardless of your security environment. Featuring 36 hands-on training courses and 10 conference tracks, networking opportunities with over 2,500 delegates from 40+ nations.
http://www.blackhat.com
------------------------------------------------------------------------------


Esta mensagem, incluindo seus anexos, pode conter informacoes privilegiadas e/ou de carater confidencial, nao podendo 
ser retransmitida sem autorizacao do remetente.

Portanto, se voce recebeu esta mensagem por  engano, por favor, nos informe respondendo imediatamente a este e-mail e 
em seguida apague-a.

A empresa MULTIPLAN nao se responsabiliza por conclusoes, opinioes, ou outras informacoes nesta mensagem que nao se 
relacionem com sua linha de negocios.


------------------------------------------------------------------------------
This List Sponsored by: Black Hat

Attend the Black Hat Briefings & Training USA, July 29-August 3 in Las Vegas. World renowned security experts reveal tomorrow's threats today. Free of vendor pitches, the Briefings are designed to be pragmatic regardless of your security environment. Featuring 36 hands-on training courses and 10 conference tracks, networking opportunities with over 2,500 delegates from 40+ nations.
http://www.blackhat.com
------------------------------------------------------------------------------


--

Thanks

Paul.

------------------------------------------------------------------------------
This List Sponsored by: Black Hat

Attend the Black Hat Briefings & Training USA, July 29-August 3 in Las Vegas. World renowned security experts reveal tomorrow's threats today. Free of vendor pitches, the Briefings are designed to be pragmatic regardless of your security environment. Featuring 36 hands-on training courses and 10 conference tracks, networking opportunities with over 2,500 delegates from 40+ nations.
http://www.blackhat.com
------------------------------------------------------------------------------


Current thread: